From: "Paul Smedley" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTPS id 9420043 for ecs-isp@2rosenthals.com; Sat, 06 Apr 2024 04:15:51 -0400 Received: from [192.168.200.201] (port=40402 helo=mail2.2rosenthals.com) by mail.2rosenthals.com with esmtp (Exim 4.96) (envelope-from ) id 1rt1DA-0006G1-1i for ecs-isp@2rosenthals.com; Sat, 06 Apr 2024 04:15:40 -0400 Received: from weasel.tulip.relay.mailchannels.net ([23.83.218.247]:64017) by mail2.2rosenthals.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1rt1D6-0005y1-2V for ecs-isp@2rosenthals.com; Sat, 06 Apr 2024 04:15:35 -0400 X-Sender-Id: perthwebhosting|x-authuser|paul@smedley.id.au Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 9D972761941; Sat, 6 Apr 2024 08:15:32 +0000 (UTC) Received: from colossiansvm.perthwebhosting.net.au (unknown [127.0.0.6]) (Authenticated sender: perthwebhosting) by relay.mailchannels.net (Postfix) with ESMTPA id 1CB60761778; Sat, 6 Apr 2024 08:15:30 +0000 (UTC) ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1712391331; a=rsa-sha256; cv=none; b=QTV0sbMQkYpNQzgtuHKppPQcrOxzlvaCNHow1uwfeTxWnYQvrPUJKU9NzQgVaAcbXHRxxm RcTE6cxWfCBmTvKw3UFcvYDMLmnP4cOm0Q1XyvGWyhil3eWsiTRv08UQf+BAIt58J/C0cX dMFm2ztduVr9AfUY7LGDGQQMsCaufFBHKBkUNk2zesPFiiuBdmKd+Tnsuo8DIgZSVfI6Im 7cbfAZ8vOO292UrQSfZ3uvWzh9YrbX4f5cPdx1JshTrusRG4GglYW+gbAAtjGHhgdu+Ks8 hUbYi5y5799HtXHSPgYU6IMU8JCg7vV8qq25MLFYdkHofIMRNs3q8w4xpp6PBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=mailchannels.net; s=arc-2022; t=1712391331; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=q5wsjqpL4XcWZ6x6fHdOnpoWW5UkjY4sFayBikub4IA=; b=GwOnTRXqk7ubfqRaLRDDQxXHyN12kbu/DYlOmwpELJ6I7HpPXLFPaTRhIXMJoOBhuub5tY 8yCbvAOymkAjHB21euUAq2FJFydJuEpp5NeMRHZhIgr12iBhhWnEjDR242bZQs7l+YXJEF +K7qMQlvtYHeP9eoHeiU6X7JVfnei10iOW1kvlFnRgNbmtAKdfOdjNf4WAovp2HUujNDbs ipxdBDgom3b4ZWc02WXYuG0EcZdC7O5pcMg+ZiDW7iUF43A3vcje2hSWXLcxkYtGPZC/eV ektQD1qW7V4XzjQ1o4jD2avrzEAafCqyf4ineGFpchi33VbxnSqIuqCQyNbl+w== ARC-Authentication-Results: i=1; rspamd-687b9dd446-khkf4; auth=pass smtp.auth=perthwebhosting smtp.mailfrom=paul@smedley.id.au X-Sender-Id: perthwebhosting|x-authuser|paul@smedley.id.au X-MC-Relay: Neutral X-MailChannels-SenderId: perthwebhosting|x-authuser|paul@smedley.id.au X-MailChannels-Auth-Id: perthwebhosting X-Ski-Company: 7fc55879481078b7_1712391331992_4177891078 X-MC-Loop-Signature: 1712391331992:309967518 X-MC-Ingress-Time: 1712391331992 Received: from colossiansvm.perthwebhosting.net.au (colossiansvm.perthwebhosting.net.au [103.13.84.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384) by 100.123.121.28 (trex/6.9.2); Sat, 06 Apr 2024 08:15:31 +0000 Received: from smedley.org ([45.249.117.21]:52072 helo=[192.168.1.159]) by colossiansvm.perthwebhosting.net.au with esmtpsa (TLS1.3) tls TLS_AES_128_GCM_SHA256 (Exim 4.96.2) (envelope-from ) id 1rt1D3-002bWP-1H; Sat, 06 Apr 2024 16:15:28 +0800 Content-Type: multipart/alternative; boundary="------------9XuNDcQJfIp79ISlaNDIGvII" Message-ID: <805933ff-3e88-4ec0-9574-2b37f703478b@smedley.id.au> Date: Sat, 6 Apr 2024 18:45:27 +1030 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Fwd: [ANNOUNCEMENT] Apache HTTP Server 2.4.59 Released References: <1712238846.IXIWFTMQ@httpd.apache.org> Content-Language: en-AU To: Apache HTTP Server for OS/2 , eCS ISP Mailing List In-Reply-To: <1712238846.IXIWFTMQ@httpd.apache.org> X-Forwarded-Message-Id: <1712238846.IXIWFTMQ@httpd.apache.org> X-AuthUser: paul@smedley.id.au This is a multi-part message in MIME format. --------------9XuNDcQJfIp79ISlaNDIGvII Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Hey All, OS/2 build (untested) at https://smedley.id.au/tmp/httpd-2.4.59-os2-debug-20240406.zip Cheers, Paul -------- Forwarded Message -------- Subject: [ANNOUNCEMENT] Apache HTTP Server 2.4.59 Released Date: Thu, 04 Apr 2024 09:54:06 -0400 From: covener Reply-To: dev@httpd.apache.org To: announce@httpd.apache.org Apache HTTP Server 2.4.59 Released April 04, 2024 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.59 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the new generation 2.4.x branch of Apache HTTPD and represents fifteen years of innovation by the project, and is recommended over all previous releases. This release of Apache is a security, feature and bug fix release. We consider this release to be the best version of Apache available, and encourage users of all prior versions to upgrade. Apache HTTP Server 2.4.59 is available for download from: https://httpd.apache.org/download.cgi Apache 2.4 offers numerous enhancements, improvements, and performance boosts over the 2.2 codebase. For an overview of new features introduced since 2.4 please see: https://httpd.apache.org/docs/trunk/new_features_2_4.html Please see the CHANGES_2.4 file, linked from the download page, for a full list of changes. A condensed list, CHANGES_2.4.59 includes only those changes introduced since the prior 2.4 release. A summary of all of the security vulnerabilities addressed in this and earlier releases is available: https://httpd.apache.org/security/vulnerabilities_24.html This release requires the Apache Portable Runtime (APR), minimum version 1.5.x, and APR-Util, minimum version 1.5.x. Some features may require the 1.6.x version of both APR and APR-Util. The APR libraries must be upgraded for all features of httpd to operate correctly. This release builds on and extends the Apache 2.2 API. Modules written for Apache 2.2 will need to be recompiled in order to run with Apache 2.4, and require minimal or no source code changes. https://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING When upgrading or installing this version of Apache, please bear in mind that if you intend to use Apache with one of the threaded MPMs (other than the Prefork MPM), you must ensure that any modules you will be using (and the libraries they depend on) are thread-safe. Please note the 2.2.x branch has now passed the end of life at the Apache HTTP Server project and no further activity will occur including security patches. Users must promptly complete their transitions to this 2.4.x release of httpd to benefit from further bug fixes or new features. --------------9XuNDcQJfIp79ISlaNDIGvII Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 7bit

Hey All,

OS/2 build (untested) at https://smedley.id.au/tmp/httpd-2.4.59-os2-debug-20240406.zip

Cheers,

Paul



-------- Forwarded Message --------
Subject: [ANNOUNCEMENT] Apache HTTP Server 2.4.59 Released
Date: Thu, 04 Apr 2024 09:54:06 -0400
From: covener <covener@apache.org>
Reply-To: dev@httpd.apache.org
To: announce@httpd.apache.org


Apache HTTP Server 2.4.59 Released

April 04, 2024

The Apache Software Foundation and the Apache HTTP Server Project
are pleased to announce the release of version 2.4.59 of the Apache
HTTP Server ("Apache"). This version of Apache is our latest GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This release of Apache is
a security, feature and bug fix release.

We consider this release to be the best version of Apache available, and
encourage users of all prior versions to upgrade.

Apache HTTP Server 2.4.59 is available for download from:

https://httpd.apache.org/download.cgi

Apache 2.4 offers numerous enhancements, improvements, and performance
boosts over the 2.2 codebase. For an overview of new features
introduced since 2.4 please see:

https://httpd.apache.org/docs/trunk/new_features_2_4.html

Please see the CHANGES_2.4 file, linked from the download page, for a
full list of changes. A condensed list, CHANGES_2.4.59 includes only
those changes introduced since the prior 2.4 release. A summary of all of the security vulnerabilities addressed in this and earlier releases is available:

https://httpd.apache.org/security/vulnerabilities_24.html

This release requires the Apache Portable Runtime (APR), minimum
version 1.5.x, and APR-Util, minimum version 1.5.x. Some features may
require the 1.6.x version of both APR and APR-Util. The APR libraries
must be upgraded for all features of httpd to operate correctly.

This release builds on and extends the Apache 2.2 API. Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.4, and require minimal or no source code changes.

https://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING

When upgrading or installing this version of Apache, please bear in mind
that if you intend to use Apache with one of the threaded MPMs (other
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.

Please note the 2.2.x branch has now passed the end of life at the Apache
HTTP Server project and no further activity will occur including security
patches. Users must promptly complete their transitions to this 2.4.x
release of httpd to benefit from further bug fixes or new features.


--------------9XuNDcQJfIp79ISlaNDIGvII--